Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.

Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.